Getting a new job, recovering from an abusive relationship, engaging in new kinds of activism, moving to a different country—these are all examples of reasons one might decide to start using Facebook in a more private way. While it is relatively straightforward to change your social media use movi...
- Monday, 17 April 2017 06:38
- By Corey Parker
Dyn estimated that the attack had involved ‘100,000 malicious endpoints’, and the company said there had been reports of an extraordinary attack strength of 1.2 terabits (1,200 gigabytes) per second. Photograph: Alamy Dyn, the victim of last week’s denial of service attack, said it was orchest...
- Sunday, 16 April 2017 06:51
- By Eric Beaudoin
In the kingdom of apps and unicorns, Rossotti’s is a rarity. This beer garden in the heart of Silicon Valley has been standing on the same spot since 1852. It isn’t disruptive; it doesn’t scale. But for more than 150 years, it has done one thing and done it well: it has given Californians a go...
- Sunday, 16 April 2017 06:02
- By Logan Hochstetler
For anyone who is really concerned about keeping their thoughts private there is only one piece of reliable technology: write with a pen on paper, and burn what you’ve written when you’re done. For the rest of us, who want to get things done, there is an inevitable trade-off which we still don...
- Sunday, 16 April 2017 05:57
- By Jasper Solander
Internet privacy was once again thrust into the limelight recently when President Donald Trump signed a bill that would allow internet service providers to sell your browsing history to third parties like advertisers. As much as the news rekindled concerns around internet privacy, little has actua...
- Sunday, 16 April 2017 05:30
- By Jason bourne
Zcash’s new cryptocurrency promises complete anonymity In October, I was in a van in Denver with Zooko Wilcox,the CEO of Zcash, a company that was soon to launch a new blockchain-based digital currency of the same name. On the floor next to me was a bunch of recently purchased compu...
- Saturday, 15 April 2017 02:13
- By Alex Grey
Attacker attribution, whether online or physical, is tremendously difficult. In some cases, the attacker or attacker group will claim the incident, but especially in the case of physical or alleged terror attacks, those claims are not always immediate. This creates a haunting, even more unset...
- Friday, 14 April 2017 05:39
- By Edna Thomas
Karim Baratov poses in front of his house in Ancaster, Ont., in this undated photo. Online, Baratov presents himself as a high-end car enthusiast who made his 'first million' at age 15. (Facebook) 22-year-old Hamilton resident's social media profiles paint different picture than FBI's The FBI allege...
- Thursday, 13 April 2017 03:51
- By Barbara Larson
Trolling can spread from person to person, research shows. Credit: blambca/Shutterstock This article was originally published at The Conversation. The publication contributed the article to Live Science's Expert Voices: Op-Ed & Insights. "Fail at life. Go bomb yourself." Comments like this one, f...
- Tuesday, 11 April 2017 15:10
- By AOFIRS .
People love using macOS for plenty of reasons: its simple navigability, its built-in suite of creative-minded tools, and y'know, the whole Apple fanboy thing. But the OS's perceived security remains one of the biggest draws for picking a Mac over a Windows device That security, however, may be at ri...
- Tuesday, 11 April 2017 11:47
- By Anna K. Sasaki
The Universal Windows Platform introduces a walled garden for Windows applications, along with sandboxing to ensure the apps behave Microsoft’s renewed focus on Universal Windows Platform (UWP) is about more than an improved user experience or an attempt to get additional apps into the Windows Sto...
- Tuesday, 11 April 2017 11:25
- By Carol R. Venuti
Online abuse has been a problem ever since the Internet was created. But over the past few years, it seems to have escalated—despite the efforts of platforms like Twitter and Facebook to try and control it. And some experts believe it could get worse before it gets better. A new report from the Pe...
- Tuesday, 11 April 2017 07:54
- By Anna K. Sasaki
Hiring a hacker could reveal security flaws in your organisation. The global cost of cybercrime could reach £4.9 trillion annually by 2021, according to a recent report from Cybersecurity Ventures. Cyber crime incidents continue to plague organisations globally, even as businesses pour money into b...
- Tuesday, 11 April 2017 05:55
- By Alex Grey
Your smartphone is surprisingly vulnerable to viruses and malware. But you can protect yourself. More BARCELONA — The smartphone industry has given birth to a vibrant growth sector distinguished by its creativity, drive and entrepreneurship. Unfortunately, that sector is malware. Conversations wit...
- Sunday, 09 April 2017 04:53
- By Edna Thomas
The problem with our grasp of cybersecurity isn’t so much that we remain dangerously illiterate — it’s that we think we know what we’re doing anyway. The Pew Research Center was a little more diplomatic than that, though, in characterizing the findings of a new survey of Americans’ underst...
- Friday, 07 April 2017 06:21
- By Grace Irwin
The intrusion tools highlighted by the WikiLeaks documents do not appear to be instruments of mass surveillance. So it's not as if everyone's TV or high-tech vehicle is at risk The publication by WikiLeaks of documents it says are from the CIA’s secret hacking program describe tools that can turn ...
- Thursday, 06 April 2017 02:12
- By Grace Irwin
On Monday, President Trump signed into law a rollback of internet privacy rules in a decision widely condemned by Democrats and privacy advocates. Opposition to the bill centered on one flawed – though admirable – argument, namely that Corporate America should not be allowed to snoop ...
- Thursday, 06 April 2017 01:58
- By Edna Thomas
Plans to keep a record of UK citizens' online activities face a challenge from tech firms seeking to offer ways to hide people's browser histories. Internet providers will soon be required to record which services their customers' devices connect to - including websites and messaging apps. The Hom...
- Tuesday, 04 April 2017 08:54
- By Martin Grossner
When it comes to internet trolls, online harassment and fake news, there’s not a lot of light at the end of the online tunnel. And things are probably going to get darker. Researchers at the Pew Research Center and Elon University’s Imagining the Internet Center asked 1,537 scholars and tec...
- Tuesday, 04 April 2017 07:31
- By Anna K. Sasaki
Researchers at Ben-Gurion University in Israel have developed a new technique to combat cyber attacks, which they say can protect against any attack carried out through internet photo and video. A new technique for combating cybercriminals, developed by a researcher at Ben-Gurion University of the N...
- Tuesday, 04 April 2017 07:23
- By Eric Beaudoin
Companies like Paul Bunyan Communications, AT&T and Comcast have made public announcements pledging that their values remain unchanged in the face of the FCC ruling that now allows them to sell customer data. (TNS) — BEMIDJI — Internet providers locally and nationally have stated they won't ...
- Tuesday, 04 April 2017 01:06
- By Anna K. Sasaki
Amidst WikiLeaks’ revelations about the CIA’s capabilities to hack into Apple products is DarkSeaSkies – a tool used to monitor and control MacBook Air that’s physically installed by a CIA agent or asset in “less than 29 seconds.” Screwdriver’DarkSeaSkies is a tool that ru...
- Saturday, 01 April 2017 07:16
- By Edna Thomas
Users of the popular WhatsApp Web service are being warned to restart their web browsers after a terrifying vulnerability was discovered. The serious security flaw can allow cyber criminals to access personal data including photos, contacts and videos in a matter of seconds. Worryingl...
- Saturday, 01 April 2017 03:50
- By Corey Parker
SAN FRANCISCO — Protecting your Internet activities from collection and sale by marketers is easier said than done, especially after Tuesday’s vote to overturn pending FCC privacy rules for Internet Service Providers. The move by Congress dismantled rules created by the Federal Communi...
- Friday, 31 March 2017 08:05
- By Martin Grossner
(Reuters) - The vote by the U.S. Congress to repeal rules that limit how internet service providers can use customer data has generated renewed interest in an old internet technology: virtual private networks, or VPNs. VPNs cloak a customer's web-surfing history by making an encrypted connection to ...
- Friday, 31 March 2017 00:02
- By Anna K. Sasaki